Paper 2008/270

New Collision attacks Against Up To 24-step SHA-2

Somitra Kumar Sanadhya and Palash Sarkar

Abstract

In this work, we provide new and improved attacks against 22, 23 and 24-step SHA-2 family using a local collision given by Sanadhya and Sarkar (SS) at ACISP '08. The success probability of our 22-step attack is 1 for both SHA-256 and SHA-512. The computational efforts for the 23-step and 24-step SHA-256 attacks are respectively 211.5 and 228.5 calls to the corresponding step reduced SHA-256. The corresponding values for the 23 and 24-step SHA-512 attack are respectively 216.5 and 232.5 calls. Using a look-up table having (resp. ) entries the computational effort for finding 24-step SHA-256 (resp. SHA-512) collisions can be reduced to (resp. ) calls. We exhibit colliding message pairs for 22, 23 and 24-step SHA-256 and SHA-512. This is the \emph{first} time that a colliding message pair for 24-step SHA-512 is provided. The previous work on 23 and 24-step SHA-2 attacks is due to Indesteege et al. and utilizes the local collision presented by Nikolić and Biryukov NB) at FSE '08. The reported computational efforts are and for 23 and 24-step SHA-256 respectively and and for 23 and 24-step SHA-512. The previous 23 and 24-step attacks first constructed a pseudo-collision and later converted it into a collision for the reduced round SHA-2 family. We show that this two step procedure is unnecessary. Although these attacks improve upon the existing reduced round SHA-2 attacks, they do not threaten the security of the full SHA-2 family.

Metadata
Available format(s)
PDF PS
Publication info
Published elsewhere. This is the extended version of a paper which will appear in Indocrypt 2008.
Keywords
CryptanalysisSHA-2 hash familyreduced round attacks.
Contact author(s)
somitra_r @ isical ac in
History
2008-09-22: revised
2008-06-18: received
See all versions
Short URL
https://ia.cr/2008/270
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/270,
      author = {Somitra Kumar Sanadhya and Palash Sarkar},
      title = {New Collision attacks Against Up To 24-step {SHA}-2},
      howpublished = {Cryptology {ePrint} Archive, Paper 2008/270},
      year = {2008},
      url = {https://eprint.iacr.org/2008/270}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.